Beijing Chainan Chainsmap monitoring system found that in the past 10 days, the money laundering of stolen ETH by Upbit was in a relatively low frequency period, and further distributed the ETH that had previously been transferred to a centralized money laundering address (the period is likely to accompany the offline transaction process) ), But starting from today, in terms of on-chain behavior, related money laundering activities are likely to enter another round of active period. According to statistics, the number of Upbit stolen ETH addresses at levels three and four is currently in the early 100,000 ETH level, which means that more than two-thirds of the stolen 342,000 ETH has been laundered.
According to data analyst SXWK, Upbit's stolen ETH was mainly concentrated on 28 addresses in the fourth level, and then based on this level, the money was laundered and transferred quickly in batches. Currently, only 9 addresses have accumulated 85013 ETH. In addition, there are 15055.9 ETH remaining in the 4 addresses of the third level. Previously, Upbit's money launderers also laundered the fourth-level address ETH in batches, and did not frequently operate for two weeks. SXWK also pointed out that during the notification process of the relevant anti-money laundering information industry in which it participated, it was learned that many exchanges have established communication channels with Upbit, but the specific freezing effect of stolen money still needs to be confirmed by Upbit.